1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
azamat
3 years ago
8

Please helpppppppppp​

Computers and Technology
1 answer:
olga_2 [115]3 years ago
7 0

Answer:

111001 - 57

1100000 - 96

1010101 - 85

1001000 - 72

:)

You might be interested in
Is EXE is the extension of MS Excel file.<br> subject: ICT for GR 5
Tju [1.3M]

Answer:

.EXE is not an extension of MS Excel File.  The extention of MS Excel files are:

.xlsx         Excel workbook

.xlsm Excel macro-enabled workbook

.xlsb Excel binary workbook

.xltx         Excel template

Explanation:

3 0
3 years ago
Google uses what strategy for matching web pages to your search request
OleMash [197]
It uses boolean operators and key words to match the correct web pages to the search request.
6 0
3 years ago
After seeing strange traffic passing through a client's DMZ network, your client has asked you to install software that will mon
Viktor [21]

Answer: Log Analyzer

Explanation:

Log Analyzer  is the software application that is used for perceiving, reviewing and understanding the records that gets created through computer.These generated records are data logs which holds the information about activities and statistics of the web and computer.

  • According to the question, log analyzer should be used by so that traffic or any web server or network related issues can be analysed , monitored and diagnosed
  • Accordingly application management process can be implemented after log analysis take places by producing log data and information about web server.

3 0
3 years ago
Read 2 more answers
Short note about micro miniaturzation​
Ghella [55]

Answer:

the manufacture of extremely small versions of electronic devices.

3 0
3 years ago
Read 2 more answers
Write a report on how you would analyze your organization and how you would select an appropriate security policy framework. Sea
olga nikolaevna [1]

Answer and Explanation:

We analyzed the security act in the organization by the following reason.

  • Protection of data  
  • Privacy of data  
  • Prevent the data loss in the network
  • Network security protection

Formation security platforms seem to be a set of structured policies, protocols and instructions aimed at directing a company or some other entity that uses them to secure their equipment, programs, content, data, server, computer systems, clients and customers through possible safety violations by using the company's facilities or services.

5 0
3 years ago
Other questions:
  • Which wildcat character will return a single character when using the find dialog box
    14·1 answer
  • Given that it takes 0.08 ms to travel from one track to the next of a hard drive; that the arm is originally positioned at Track
    6·1 answer
  • Type of malware that is spread when you distribute
    12·1 answer
  • What does server manager utility do
    7·1 answer
  • Write a Java program that will 1. Ask the user to type in a sentence, using a JOptionPane.showInputDialog(). 2. The program will
    10·1 answer
  • Words or symbols that help you narrow down your search are called:
    12·1 answer
  • In the picture below
    10·1 answer
  • Define each of the following data mining functionalities: characterization, discrimination, association and correlation analysis
    9·1 answer
  • Why would a user want to resend a message? Check all that apply.
    7·2 answers
  • HOW TO CHANGE GRADE IN SKYWARD!!
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!